StudentShare
Contact Us
Sign In / Sign Up for FREE
Search
Go to advanced search...
Satellite Technologies as the Subject of the Broker by Grisham
6 pages (9550 words) , Download 2 , Book Report/Review
Free
homeland security forces are using at least one UAV to patrol along the mexican border, Hurricane Katrina could become the event that unexpectedly both pushes forward and stimulates new purchases of UAVs by non-military branches of the U.... hrader points out how the rights to privacy that every individual has are sometimes infringed through the intrusive scrutiny by law enforcement officials, who sometimes use the images provided by satellite imagery in order to gain more information – something which is generally not permissible unless the suspect in question poses a definite threat to national security....
Preview sample
Political Parties of the USA
5 pages (1293 words) , Download 1 , Essay
Free
do not agree with the idea of the National defense and national security, being influence by more than I unit.... I strong agree that national security is a sensitive matter and one that should be left entirely in the hands of the ruling government.... hroughout years, social security has always been under controversy when parties have a say on them....
Preview sample
The United States as a World Power
5 pages (1548 words) , Download 0 , Essay
Free
History has been filled with many events and key players that have served an important part in the greater picture of national security, international participation and ultimately, worked on the crucial issue of helping to ensure the stability to the national economy.... With low unemployment comes a sense of security that gives way to feelings secure about ones economic future. ... During times of national economic strength in the markets people are able to feel a sense of security that enables them to feel secure in the sense of putting more money into the broader market which they may not have done in a less solvent environment....
Preview sample
Analysis of American Government in Different Situations
5 pages (1473 words) , Download 0 , Assignment
Free
That such a theoretical approach, limited government, helps a country maintain its economic security is questionable.... First, America was able to focus on important international threats to peace and security, such as in the Middle East and in the Koreas, without being fearful of Soviet meddling or influence.... Five of the principle roles include the American President's power to create and issue executive orders, the power to serve as Commander-in-Chief of the armed forces, the power to nominate, the power to engage in foreign policy and foreign affairs, and the power to prepare the national budget....
Preview sample
Threats of the US Unilateralism on the Rule of International law
8 pages (2204 words) , Download 2 , Essay
Free
The paper "Threats of the US Unilateralism on the Rule of International law" states that ever since the 9/11 attacks on the WTC, the United States has been pursuing its global security agenda through military actions even when it is confronted with strong opposition from the UN and also from NATO.... The stance of United Nations and security Council in particular happens to be very critical in this regard, yet the history reveals that United States pays no or negligible heed to what the UN deems peaceful and violent....
Preview sample
Stop Gun Trafficking and Strengthen Law Enforcement Act 2011 - Effects
7 pages (1750 words) , Download 4 , Research Paper
Free
Nevertheless, the ‘Stop gun trafficking and strengthen law enforcement Act 2011' will not only contribute to the reduction in gun violence, but protect the United States border security from the mexican cartels who are involved in kidnapping and crime. ... This act will also prevent cross-border gun trafficking, which is common between United States and Mexico, and therefore, the bill will benefit both the United States and Mexico in reducing gun violence.... According to the national institute of justice, in 2005 alone 11, 346 were killed by firearms, whilst 477,040 committed crimes using firearms....
Preview sample
Good Health as a Social Construction
8 pages (2318 words) , Download 1 , Assignment
Free
It discusses how might airport security screening look different through the lens of Labeling theory and critical theories.... How might airport security screening look different through the lens of Labeling theory and critical (macro) theories? ... security screening at the airport subdues and detects any form of threats, which include terrorism, disease infections, and criminals.... Airport security personnel would have lost the purpose of airport screening that initially was intended to curb insecurity....
Preview sample
Economic Condition of Mexico During Pre Crisis Period
8 pages (2488 words) , Download 0
Free
Those factors pushed the mexican economy into another recession.... n addition to the mexican declining GDP, hyperinflation took place as price of economy increased by 35% in 1995.... This also influenced the domestic investors to sell of all their shares and withdraw their invested capital, thrashing the mexican Stock Exchange and commercial banks to collapse.... The Consumer Response to the mexican Peso Crisis.... the mexican peso crisis: Sudden death or death foretold?...
Preview sample
Why Did the Cold War End and What Are the Implications for International Security
6 pages (1747 words) , Download 1 , Essay
Free
Even after the cold war there are still domination behaviors from the internal national security military in the sovereign countries (Peter, 1993).... The paper "Why Did the Cold War End and What Are the Implications for International security?... looks into the cold war, what caused it to end the impact of its end it had in regards to international security, and the role of the UN as an effective center for the purposes of global security....
Preview sample
Censorship of the Internet
8 pages (2483 words) , Download 0 , Essay
Free
ne principal reason to why authorities must enhance censorship of the internet is that this facet is extremely critical and debatable when it comes to the idea of internet privacy and national security.... owever, when we consider the other side of censorship, it tends to protect young children from exposure to unreasonably dirty materials or content, curbs crime existing online and sustains national security and integrity.... So, it is extremely crucial for nation's security or authorities to try and modify their local regulatory bodies in order to completely curb the internet freedom that is open to users....
Preview sample
Rich American History
6 pages (1674 words) , Download 2 , Assignment
Free
The government spent huge sums of money in military and security.... The government established many regulatory agencies such as Environmental protection Agency, Equal Employment Opportunity Commission, national Highway Traffic Safety Administration, Consumer Product Safety Commission, and Occupation Safety and Health Administration (Hook 67).... This law was reinforced by national Voting Right Act in 1965, and Fair Housing Act of 1968....
Preview sample
UAE Security and the Effect of Technology and Car Bombs
5 pages (1250 words) , Download 2 , Essay
Free
This paper will review the available literature and present ways in which the United Arab Emirates can make use of technology as a critical asset in addressing civil security.... UAE security and the Effect of Technology and Car Bombs UAE security and the Effect of Technology and Car Bombs Technology is a tool associated with immense power.... This paper will review the available literature and present ways in which the United Arab Emirates can make use of technology as a critical asset in addressing civil security....
Preview sample
Will MNCs be Able to Adopt Unified Cross-National HRM Strategies
14 pages (3782 words) , Download 0 , Essay
Free
Some of the main reasons for the public outcry against globalization are, discrepancy and lack of uniformity in wage rates as a result of fixation of lower wage rates by one country as against another, decrease in job security since a project can be easily be transferred from one country to another.... This essay "Will MNCs be Able to Adopt Unified Cross-national HRM Strategies?... Will MNCs ever be able to adopt unified cross-national HRM strategies, policies and practices? ...
Preview sample
Deng Xiaoping's foreign policy
13 pages (3250 words) , Download 3 , Essay
Introduction: Deng Xiao Ping was a leader who can be considered as a person who transformed china from autocratic communism to capitalistic communism (I used this phrase as he adopted capitalist policies, copied from no where).... Learning lessons from the failure of Soviet block he strived for economic development and wealth creation....
Preview sample
Public and Cultural Diplomacy
8 pages (2472 words) , Download 2 , Essay
Free
This essay "Public and Cultural Diplomacy" discusses the aspect of public and citizen diplomacy.... Besides, aspects of cultural diplomacy have also been discussed.... With citizen diplomacy, people themselves undertake the role of diplomacy without any help from the government.... ... ... ... In the 21st century when the world is highly becoming competitive most nations are resorting to attractive ways of positioning themselves in the international setting....
Preview sample
National Risk Assessment of India - Significant Effects on Various Risks on the Country and Its Citizen
21 pages (4235 words) , Report
Nobody downloaded yet
The paper 'national Risk Assessment of India - Significant Effects on Various Risks on the Country and Its Citizen' is an outstanding example of the report on social science.... The paper 'national Risk Assessment of India - Significant Effects on Various Risks on the Country and Its Citizen' is an outstanding example of the report on social science.... The paper 'national Risk Assessment of India - Significant Effects on Various Risks on the Country and Its Citizen' is an outstanding example of the report on social science....
Preview sample
The United States Patriot Act
11 pages (3259 words) , Download 2 , Essay
Free
The not-so-subtle insinuation is that “one cannot condemn racial profiling because to do so will hinder the war on terrorism and undermine national security” (McDonald, 2001).... he popularly stated position is that racial profiling is necessary because not using this tool of law enforcement would compromise the effort against terrorism thus sacrificing national security.... The attorney general simply must certify once every six months that this person is a ‘threat' to national security (“U....
Preview sample
Gated Communities and Segregation in the Tortilla Curtain
6 pages (1883 words) , Download 2 , Essay
Free
The paper "Gated Communities and Segregation in the Tortilla Curtain" discuss that for all the talk of segregation and prevention of 'invasion' by the mexican immigrants into their community, Delaney is the one who actually trespassed into an immigrant's home, although it may not be organized.... The other couple is the mexican illegal immigrants, Candido and his pregnant wife America Rincon, who enter the American borders illegally wanting to achieve the American Dream of a prosperous life, but live in an awful condition in a makeshift camp deep in the Topanga Canyon....
Preview sample
Censorship in the USA
3 pages (750 words) , Download 4 , Research Paper
Free
The repression of certain material or communication that can be a threat to the national security or offensive to the masses due to its data content is term as Censorship by the government or any administrative controlling body.... Censorship in the USA The repression of certain material or communication that can be a threat to the national security or offensive to the masses due to its data content is term as Censorship by the government or any administrative controlling body....
Preview sample
Identity Cards as a Point of Huge Controversy in British Society
5 pages (1346 words) , Download 2 , Essay
Free
The government believes that its implementation of the ID cards and the requirement of carrying it all times is for the betterment of the people and ensures more security and safety for its citizens only.... It is for this purpose that the security of the country needs to be tightened and the government has introduced the plan of identity cards to prevent fraudulent activity and secure the identity of the people.... The government explained that the issuance of identity cards in places with increased risks can also prove be important from the security point of view....
Preview sample
Three Main Levels of Analysis in the Causes of Wars
9 pages (2436 words) , Download 2 , Essay
Free
national security remains important, but in a world in which war between states is the rare exception, and many more people are killed by their own governments than by foreign armies, the concept of 'human security' has been gaining greater recognition.... titled Causes of War and Paths to Peace written in May of 2004 that would include such potential motivations as self interest, which would lead to dilemmas in security, the equivalent of fear, protection requirement as a result and then intimidation as a result of those protections....
Preview sample
America and Democratic Rule
6 pages (1530 words) , Download 1 , Essay
Free
MENA has been the subject of democracy promotion and increasing the interest part of the US government, to be specific, after the September 11, 2001 terrorist attacks, where many could view the democratic transition as being important to international security and regional stability (Pollack, 2011). ... Nevertheless, there are many important benefits of the spread of democracy in improving citizen lives, advance in US national interests, and international peace promotion (Pollack, 2011). ...
Preview sample
Management and Information Security
8 pages (2329 words) , Download 0 , Assignment
Free
The paper "Management and Information security" is a wonderful example of an assignment on management.... The paper "Management and Information security" is a wonderful example of an assignment on management.... Running header : Management and Information security ... he security of any system is the paramount objective of the system development team.... System security ensures that the system is not accessible to unauthorized people....
Preview sample
Core Concepts of Intercultural Communication to the Series 30 Days
5 pages (1266 words) , Download 0 , Movie Review
Free
However, as the documentary, presents, gun possession is a very controversial issue which should be carefully handled in order not to compromise national security. ... Whereas they should be using these gadgets for safeguarding their security, it is unfortunate that a good number of them have abused this privilege by compromising other people's security.... To them, it is these guns which can help them to individually safeguard their security....
Preview sample
The New American Temporary Workforce
15 pages (4326 words) , Download 1 , Coursework
Free
espite the occasional success stories, many studies show that contingent workers face a lack of equity in pay, benefits, security, and basic labor rights finding that, on average, they receive lower pay and benefits than regular, full-time workers who do the same work (Ferber & Waldfogel, 1996; Kalleberg et al, 1997; Mishel, Bernstein & Schmitt, 1999).... here are also several advantages offered to the temporary worker in exchange for the loss of benefits and security....
Preview sample
Gender Revolution in the Latin America
13 pages (3250 words) , Download 2 , Research Paper
Free
evolution in the Latin America States arose subsequently to two major occasions which include the mexican Revolution and the World War I.... APRA party gained its motivation from the mexican Revolution, nationalism and socialism as well as Mussolini's fascism. ... In order to gain social justice, autonomy of culture and economic security, the Latin Americans adopted foreign ideologies in addition to formulation their indigenous responses.... The Venezuelan constitution fully supports women in that it acknowledges housework as a productive activity economically and thus authorizing benefits of social security to the housewives....
Preview sample
Technology Units in the Australian Security Intelligence Organization
8 pages (2441 words) , Download 0 , Capstone Project
Free
oreover, the agency seeks to develop a system through which to detect keywords for all data transferred across the Australian network system, with such keywords linked to terrorism and global and national security concerns, to serve as a counter terrorism measure (“ACSC”, 2015).... The paper "Technology Units in the Australian security Intelligence Organization" is a wonderful example of a capstone project on marketing.... The paper "Technology Units in the Australian security Intelligence Organization" is a wonderful example of a capstone project on marketing....
Preview sample
Cross-border Merger and Acquisitions, Ideal Currency, Impact of the Global Financial Crisis
12 pages (3000 words) , Download 2 , Assignment
Free
In the recent past there has been a rapid increase in the number of cross-border mergers and acquisitions.... There are common elements that are pertinent when undertaking cross-border mergers and acquisitions namely; identification and valuation, payment of the transaction, and post-acquisition management Vadapalii, 2007).... Business Section A Cross-border Merger and Acquisitions In the recent past there has been a rapid increase in the number of cross-border mergers and acquisitions....
Preview sample
Racial Profiling Discrimination
6 pages (1779 words) , Download 3 , Essay
Free
he American nation in the past has faced many terrorist acts and a way of ensuring the national security, the government has opted in use of racial profiling.... While coming out of the shopping centre, a security guard took their shopping and started frisking arguing of shoplifting.... The society ought to take advantage of the changing technology and invent methods of enhancing security either I transport or workplaces.... For instance, a handful of new invented security technologies are available to supplement the present luggage scanners and metal detectors....
Preview sample
Similarities and Differences between Realism and Neorealism
6 pages (1500 words) , Download 2 , Coursework
Free
In this state of lawlessness, each sovereign nation can only depend on itself and its chief interest is to serve its security demands (Behr and Heath, 2009:327). ... The nation is accountable for its own progression, security, and safety.... They claim that states will gain power because some individuals want to have an advantage over other people, therefore, utilising it to enhance their own security (Hobson, 2000:45) ... eorealists attempt to concentrate towards the objective when it comes to the lust for power by indicating that power can be used to help countries gain economic and social security....
Preview sample
What Drives the Spy or the Whistleblower May Be Different
12 pages (3891 words) , Download 0 , Term Paper
Free
Or, should this really matter, when it comes to matters of national security? ... dward Snowden worked as an employee of national security Agency's (NSA's) contactor firm Booz Allen Hamilton.... According to Turley (2014), he was a low-level employee of Dell contractor at a nondescript national security Agency site.... Leaker Traitor Whistleblower Spy: national security Leaks and The First Amendment.... The Espionage Act and national security Whistleblowing After Garcetti....
Preview sample
The Causes of Crime with Special Emphasis on Social and Psychological Factors
16 pages (4954 words) , Download 2 , Essay
Free
To measure crime several indicators such as homicide prevalence, reported injury rates, as well as the size of county's security apparatus.... The first step involves the use of al means in order to deny the terrorists the chance of committing the crime in other words decapacitating them, this is possible through number of ways which include, cutting arms supply, denying terrorists access to arms and other weaponry which would be harmful if left in the reach of the terrorists and improved security checks in all vulnerable areas such as airports all aimed at lessening the probability of terrorists successfully attacking the US. ...
Preview sample
Cyber Techniques and International Tensions
11 pages (2883 words) , Download 3 , Essay
Free
With the detection of threats at the state level, it is possible to retain legitimate response actions by the state and this will be an important actor of the border in ensuring they continue being relevant.... Cyber Techniques and International Tensions In the modern world where computers and developments related to them have become commonplace, they have brought with them problems with reference to cyber security.... It has been found that cyber security is an important factor to be considered by any state in the world it is to protect itself from malicious attacks and software from the internet....
Preview sample
Healthcare systems: Are markets the answer
6 pages (1500 words) , Download 2 , Essay
Free
In Germany, Otto von Bismarck introduced a social insurance program in the 1880s, and this was the first approach to social security, where a health insurance plan was first provided for workers (Eurofund).... s I previously stated, Saudi Arabia's Ministry of Health, a government agency, would be the health provider for the entire population, but there are also other agencies, which deliver health care to specific enrolled security and armed forces population: Military hospitals, security forces hospitals, and National Guard hospitals, among others....
Preview sample
How National Cultures Impact the Operations of Hospitality Enterprises
8 pages (2000 words) , Download 3 , Literature review
Free
Hence to market a service to the Chinese customer, the price, the brand name and the prestigious status are more important while to the western customer, the room size, security, proximity, and location will hold priority.... This review assesses to what extent national cultures impact the operations of hospitality enterprises across national boundaries.... Under these circumstances, national culture has a significant role to play in determining the practices and operations that should be applied....
Preview sample
The Importance of Computer Security
9 pages (2330 words) , Download 3 , Literature review
Free
The paper "The Importance of Computer security " highlights that Ashgapour stated that a primary goal of effective risk communication is to assist individuals in making informed decisions about the type of risks which are acceptable and which are not.... Computer security is a primordial concern of all types of organizations.... The challenges to preserving and safeguarding computer security are tremendous.... Hence, academicians and computer security professionals undertake various studies to address this issue thoroughly and creatively....
Preview sample
Soviet Policy Toward Afghanistan Prior to the Invasion of 1979
13 pages (3748 words) , Download 0 , Case Study
Free
national security Adviser Zbigniew Brzezinski as “the Soviets' Vietnam” (Mid-East Realities, 2001, and Baxter, 2001), had far-reaching effects.... n 1998, Zbigniew Brzezinski, President Carter's national security Adviser at the time of the Soviet invasion, gave an interview to a French magazine in which he claimed, ... The national security Archive, George Washington University.... fghanistan's historical relationship with Russia dates back to 1868, when the Amir of Bukhara signed a “peace treaty” with the Tsar that extended Russian control to the banks of the Amu Darya River, the northern border of Afghanistan....
Preview sample
Political and Cultural Factors in Influencing Global Investment Decisions
16 pages (4475 words) , Download 2 , Essay
Free
It is important for companies to constantly ensure that there is a margin of security in their investment.... Lecturer: presented: Introduction It is important for companies engaging in global investment decisions to constantly ensure that there is a margin of security in their investment....
Preview sample
Factors Influencing the Formulation of Maritime Policy at International Level
8 pages (2267 words) , Download 2 , Coursework
Free
The paper "Factors Influencing the Formulation of Maritime Policy at International Level" states that the social factor may come into play in the process of the formulation of the maritime policy at the international level when a nation or a host of them wants to reserve their national identity and prestige.... evertheless, the need to formulate policies that are appropriate for the accomplishment of both national and international maritime industry objectives have always conflicted, considering that different nations seek to apply protectionism policy measures nationally, and at the same time seek liberalism in the international waters....
Preview sample
The United States Constitution in Relation to the Army Officers Corps
4 pages (1328 words) , Download 0 , Coursework
Free
The various duties and responsibilities include civil-military relations and national security policy implementation.... The character of a democratic state's civil military relations has implications for the quality of its national security policy, the preservation of the democratic values on which the state was founded, and the relationship between the democracy's citizens and the military.... They are part of a larger national security community made up of national security professionals from both the civilian and military spheres, other participants such as journalists and academics who contribute intellectual capital and foster debate, legislative bodies, and the public to whom all of the above are responsible....
Preview sample
National Risk Register for India
13 pages (3766 words) , Download 0 , Assignment
Free
reate new security frameworks ... Food security and Environmental Quality in the Developing World, CRC Press ... "national Risk Register for India" paper overviews the risks that the environment and the people of India.... national Risk Register for India ... oor national productivity which lead economic loss ... he topmost event in the fault tree analysis above is the national losses.... The national losses occur due to risks on the environment, social events, political condition and ...
Preview sample
Cuban missel crisis
10 pages (2500 words) , Download 2 , Essay
Cuban Missile Crisis: An Analysis based on theories of International Relations During the Cuban Missile Crisis the world came very close to a nuclear war, the closest ever in the history and such a crisis has not taken place eversince.... The armed forces of both the countries, the United States and the Soviet Union were at the ready to combat each other and both the countries had decided to use nuclear weapons if needed....
Preview sample
What Factors are Associated with Specialization Intentions for Paramedic Practice
5 pages (1250 words) , Download 2 , Essay
Free
How significant is job security in your chosen field of specialisation?... ______personal specialisation interest ______flexible work hours ______higher compensation ______job security ______lifestyle ______career advancement ______professional competence Appendix 2 Thank you for agreeing to discuss with me the research project I am undertaking.... The Developments in Paramedical Science and the implications of national and International Accreditation and Registration in Alliance with Ambulance Authorities....
Preview sample
Security and Maritime Issues in the Indian Ocean
8 pages (2252 words) , Download 2 , Term Paper
Free
Recently, ‘national security Advisor' announced about an agreement, which included the chance of joining as well as sharing security along with stability partnership for the related regions of the IOR.... This paper "security and Maritime Issues in the Indian Ocean" analyzes how significant are maritime issues persist within the Indian Ocean from the standpoint of overall global security along with stability.... Global security is being implemented to rebalance Indian maritime security by focusing much upon geopolitical rivalry issues, maintaining democratic peace between the related states of the IOR, rearranging the security norms of coastal guide incorporated with military base and other related critical factors....
Preview sample
The Differences in Economic Circumstances Impact Upon the Families
11 pages (2750 words) , Download 3 , Research Proposal
Free
Another challenge which the mexican families face is the increase in migration to countries like U.... and Canada for better working conditions which is a serious danger to the cultural identities of the mexican family.... The advent of globalization, liberalization has weakened the family structure in the mexican society by weakening its traditional structure.... the mexican family is defined by the power and supremacy of the father....
Preview sample
Foreign policy assignment
4 pages (1000 words) , Download 3 , Assignment
In your opinion, how appropriate were these policies in regard to US national interests, and how effective was Clinton in achieving his objectives?... This was a good target for national interests – these new states had many of the resources left over from the Soviet Union, such as stockpiles of nuclear weapons, and if they were thrown into chaos they would have been incredibly dangerous....
Preview sample
Sino-American Relations
6 pages (1661 words) , Download 1 , Coursework
Free
nitially, Chinese leaders were interested in improving relations with the United States because of the security concerns that originated from the Sino-Soviet border clashes in 1969.... These two countries are locked into a power struggle and they have conflicting ideologies, that is, America is struggling to remain at the top in the Asian Pacific regional security structure but China is reluctant to allow it.... China is reluctant to allow America to take the dominant role in the Asia Pacific regional security structure (Koehn and Cheng 1999, p....
Preview sample
Domestic Military Intelligence of the United States
3 pages (962 words) , Download 3 , Assignment
Free
These include the Central Intelligence Agency, the Department of Homeland Security, Intelligence and Analysis, the Department of State, Intelligence and Research, the Defense Intelligence Agency, the national security Agency, the Federal Bureau of Investigation, and the Drug Enforcement Administration among others3.... lthough these agencies seem to work independently, they are collaborative and share databases and operations to defend the country by ensuring national security as well as the security of government interests and personnel outside the country4....
Preview sample
Health Care, Immigration and Society: An Analysis of Demand and Supply
9 pages (2250 words) , Download 2 , Research Paper
Free
Borders, Laborers, and Racialized Medicalization: mexican Immigration and US Public Health Practices in the 20th Century, American Journal of Public Health.... This tiered hierarchy suggests that after security needs are met, such as shelter, belonging and self-esteem development can be actualized, but only if the first lower needs are met sufficiently.... There are genuine lifestyle restraints that impact the most basic survival and security needs, coupled with a social attitude within the health care network that considers their needs to be inferior to those in a more affluent environment or with adequate health insurance....
Preview sample
The Phased Withdrawal of the United States Troops from Iraq
3 pages (1210 words) , Download 2 , Essay
Free
These arguments revolve around all economic, political, and national security considerations.... bull; The cost of the war translates into 11,000,000 four year college/university scholarships for US citizens; and• The cost of the war could has covered the health insurance of the nation's children (Turner, 2005)National SecurityParadoxically, while the Iraq war was launched in the name of national security it has effectively undermined national security....
Preview sample
1401 - 1450 results of 314382 items
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.
Contact Us